Solved

USB ThumbDrive Trim-like Utility

Posted on 2010-09-24
4
654 Views
Last Modified: 2012-06-27
Is there any point in running a "Trim Like" utility or garbage collection utility on a thumbdrive? If so, what is a good utility to use?
0
Comment
Question by:lacrewga
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 6

Accepted Solution

by:
CRJ2000 earned 500 total points
ID: 33754606
Are you asking if there's a reason to zero out all of the "unused" space on the thumb drive? Unless you have concerns about security of data on that drive, I wouldn't bother. It won't make the drive any faster/more efficient, and it causes needless reading/writing to the drive.

If security is a concern, them I would look at any of the applications that can wipe free space, such as CCleaner (http://www.piriform.com/).

Chris
0
 
LVL 26

Expert Comment

by:MidnightOne
ID: 33755075
I'd also recommend using TrueCrypt on the USB stick in Traveler mode; without the right password, the data's worthless anyway.
0
 
LVL 7

Author Comment

by:lacrewga
ID: 33755141
Actually, I have an old OCZ Rally2 that is getting slower and I was hoping...
0
 
LVL 6

Expert Comment

by:CRJ2000
ID: 33755177
I'm afraid there isn't much to be done. If it were a hard drive, the natural response would be to defrag it. But here's a good article about why not to defrag a thumb drive: http://ask-leo.com/should_i_defragment_my_usb_flash_drive.html

0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
Articles on a wide range of technology and professional topics are available on Experts Exchange. These resources are written by members, for members, and can be written about any topic you feel passionate about. Learn how to best write an article t…
Saved searches can save you time by quickly referencing commonly searched terms on any topic. Whether you are looking for questions you can answer or hoping to learn about a specific issue, a saved search can help you get the most out of your time o…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question